High efficiency in capacity utilization and fast restoration are two primary goals of survivable design in optical networks. Shared backup path protection has been shown to be efficient in terms of capacity utilizatio...
详细信息
High efficiency in capacity utilization and fast restoration are two primary goals of survivable design in optical networks. Shared backup path protection has been shown to be efficient in terms of capacity utilization, due to the sharing of backup capacity. However, sharing of backup capacity also complicates the restoration process, and leads to slow recovery. Ring-type protection in mesh topology, on the other hand, has the advantage of fast restoration. The p-cycle scheme is the most efficient ring-type protection method in terms of capacity utilization. Recently, the concept of pre-cross-connected protection was proposed to increase the recovery speed of shared path protection. We overview these protection methods and their failure recovery processes. The recovery time of these schemes are compared analytically. To compare the capacity efficiency, we formulate integer programming optimization problems for three protection methods in static traffic scenario, considering wavelength continuity constraint. We investigate the effect of network connectivity on the performance of capacity utilization of the methods by experimenting on topologies with different average nodal degrees.
With the general trend towards ubiquitous access to networks, more users will prefer to make voice calls through the Internet. Voice over IP (VoIP) as the application which facilitates voice calls through the Internet...
详细信息
With the general trend towards ubiquitous access to networks, more users will prefer to make voice calls through the Internet. Voice over IP (VoIP) as the application which facilitates voice calls through the Internet will increasingly occupy more traffic. The growth of delay sensitive traffic that requires special quality of service from the network will impose new constraints on network designers who should wisely allocate the limited resources to users based on their required quality of service. An efficient resource allocation depends upon gaining accurate information about the traffic profile of user applications. In this paper, we have studied the access level traffic profile of VoIP applications and proposed a realistic distribution model for VoIP traffic. Based on our model, we have introduced an algorithm for resource allocation in networks. It is shown that using our algorithm will enhance the delay and utilization performance of the network.
We overview the plasma properties of a two-dimensional electron gas in semiconductor heterostructures as well as new concepts and proposals of novel terahertz devices (detectors, sources utilizing plasma instabilities...
详细信息
Group key management (GKM) prevents all non-membership users from acquiring the group key to decrypt the encrypted messages broadcasted among group members. In this paper, we incorporate elliptic curve cryptosystem (E...
详细信息
Group key management (GKM) prevents all non-membership users from acquiring the group key to decrypt the encrypted messages broadcasted among group members. In this paper, we incorporate elliptic curve cryptosystem (ECC) into GKM to decrease the key length while providing securities at the same level as that of other cryptosystems, and propose the cluster scheme to make the key management more efficient.
Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the network to evade current router based co...
详细信息
Low rate DoS attacks are emerging threats to the TCP traffic, and the VoIP traffic in the Internet. They are hard to detect as they intelligently send attack traffic inside the network to evade current router based congestion control mechanisms. We propose a practical attack model in which botnets that can pose a serious threat to the Internet are considered. Under this model, an attacker can scatter bots across the Internet to launch the low rate DoS attack, thus essentially orchestrating the low rate DoS attack that uses random and continuous IP address spoofing, but with valid legitimate IP addresses. It is difficult to detect and mitigate such an attack. We propose a low rate DoS attack detection algorithm, which relies on the core characteristic of the low rate DoS attack in introducing high rate traffic for short periods, and then uses a proactive test based differentiation technique to filter the attack packets. The proactive test was originally proposed to defend DDoS attacks and low rate DoS attacks which tend to ignore the normal operation of network protocols, but it is tailored here to differentiate the legitimate traffic from the low rate DoS attack traffic instigated by botnets. It leverages on the conformity of legitimate flows, which obey the network protocols. It mainly differentiates legitimate connections by checking their responses to the proactive tests which include puzzles for distinguishing botnets from human users. We finally evaluate and demonstrate the performance of the proposed low rate DoS attack detection and mitigation algorithm on the real Internet traces.
A wind farm typically consists of a large number of individual wind turbine generators (WTGs) connected by an internal electrical network. To study the impact of wind farms on the dynamics of the power system, an impo...
详细信息
The terahertz (THz) resonant detectors based on 2DEG channels with lateral Schottky junctions (LSJ) by accounting for the effects of the contact pads serving as an antenna are discussed. These devices have the structu...
详细信息
The terahertz (THz) resonant detectors based on 2DEG channels with lateral Schottky junctions (LSJ) by accounting for the effects of the contact pads serving as an antenna are discussed. These devices have the structures similar to high-electron-mobility transistors except that they have LSJs at either source or drain contacts. Plasma oscillations in the channels are excited by THz signals supplied by external antennas or coupled through the contact pads. The THz signals induce rectified currents due to the nonlinear current-voltage characteristics at LSJ. Detected signals can be resonantly large when the frequency of signals is close to one of the resonant plasma frequencies, which can be in the THz range for the submicrometer channel with sufficiently large electron concentration. The lateral Schottky diode antenna has the first peak with smaller resonant frequency compared with the responsivity of the lateral Schottky diode connected with an external antenna.
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ACM synthesis method based on the gen...
详细信息
ISBN:
(纸本)9783540730934
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, an automatic ACM synthesis method based on the generation of the reachability graph and the theory of regions was proposed. In this paper, we propose a new synthesis method based on the composition of Petri net modules, avoiding the exploration of the reachability graph. The behavior of ACMs is formally defined and correctness properties are specified in CTL. Model checking is used to verify the correctness of the Petri net models. The algorithms to generate the Petri net models are presented. Finally, a method to automatically generate C++ source code from the Petri net model is described.
PLC technology applications in low voltage indoor power grids apart from Internet services are related also to monitoring and remote control applications. The CENELEC B band provides adequate transfer rate for such na...
详细信息
PLC technology applications in low voltage indoor power grids apart from Internet services are related also to monitoring and remote control applications. The CENELEC B band provides adequate transfer rate for such narrow band PLC applications. This paper presents an indoor network model, suitable for the analysis of narrow band PLC transmission. laboratory tests and simulation results concerning signal transmission characteristics for the different model configurations are reported. The ATP-EMTP program is used for the simulation of the transmission path. Results obtained by the simulation of different cases with variable electrical appliances connected are compared to the actual measurements from laboratory tests, showing satisfactory agreement. The impact of the appliances on the signal transmission is investigated and they are classified accordingly. Finally, the proposed equivalent models are used in a simulation of the signal transmission in a building.
PLC technology applications in Medium Voltage (MV) distribution networks are mainly related to the monitoring, control and metering applications. The CENELEC A band provides adequate transfer rate for such narrow band...
详细信息
PLC technology applications in Medium Voltage (MV) distribution networks are mainly related to the monitoring, control and metering applications. The CENELEC A band provides adequate transfer rate for such narrow band PLC applications. Scope of this paper is to present simulation results concerning NPL signalling on MV distribution networks. Cases of underground cables, overhead lines and distribution transformers are examined. All simulations have been done using the Electromagnetic Transients Program (ATP-EMTP). Results seem to be consistent with transmission line theory and modal wave propagation, showing standing wave signal voltage profiles along the lines. The case of an existing aerial MV distribution network is also examined for different frequencies and loading conditions, including open-ended lines, transformers, compensation capacitors and combinations of them.
暂无评论